POPI Act Finally Has the Power | Data Protection SA

POPI Act Finally Has the Power

The POPI (Protection of Personal Information Act 4 of 2013) in South Africa became effective in 2016, however, as most businesses know, it has had little in the way of enforcement. This status has completely changed effective July 1, 2020, because now POPIA is empowered with the ability to investigate and fine responsible parties for […]

Transportation and telecommunications targeted | FireEye.

Transportation and telecommunications targeted | FireEye.

A huge Chinese espionage effort against US and European government agencies, according to security firm FireEye, comprises four new hacking tools and spans more business sectors than previously revealed. In hacks affecting the transportation and telecommunications industries, two China-linked gangs — as well as other hackers who investigators did not name — have employed virtual […]

Ransomware Attack on Pipeline Alerts Companies to Dangers

Ransomware Attack on Pipeline Alerts Companies to Dangers

Cyber criminals using ransomware have been around for a long time however in the last 5 years or so they have changed their methods of attack from private citizens to larger, more lucrative victims. In the last few years, hackers have focused on the bigger medical institutions and in May 2021 they sent their malware […]

COVID-19 Fears Make Cyber Scams in South Africa Easier

COVID-19 Fears Make Cyber Scams in South Africa Easier

As if a global pandemic hasn’t been enough, it appears that cybercrime is on the rise in South Africa as criminals take advantage of corporate weaknesses during the COVID-19 crisis. From increased phishing scams to attacks on networks, companies seem to be aware that they need to do something but few are taking an action. […]

Experian Breach May Have Hit Millions in South Africa

Experian Breach May Have Hit Millions in South Africa

It has almost become commonplace to hear about cybersecurity attacks that result in system breaches. From individuals to corporations, everything from ransomware to network rifts, even those that have made attempts to protect personal and proprietary information have suffered by perpetrators. Given the high level of attention that global company communities have had towards cybercriminals, […]